More jobs:
IT Specialist; Infosec/Network; TITLE Security Clearance
Job in
Brenham, Washington County, Texas, 77833, USA
Listed on 2026-02-25
Listing for:
Department of the Air Force
Full Time
position Listed on 2026-02-25
Job specializations:
-
IT/Tech
Cybersecurity -
Engineering
Cybersecurity
Job Description & How to Apply Below
Duties As a IT SPECIALIST (INFOSEC/NETWORK) (TITLE
5) with the Texas National Guard, your duties will include, but will not be limited to:
* Performs as the Team Technical Lead during vulnerability assessments of DoD information systems. Utilizes knowledge of systems security principles and concepts, of new Information Technology (IT) security developments, and of the infrastructure protection environment to select appropriate tools to be used by team members. Provides assistance to owners of assessed systems by providing recommendations pertaining to implementing security programs designed to anticipate, assess, and minimize system vulnerabilities, to correct deficiencies discovered, and to apply new IT security concepts.
Briefs commanders and network administrators on the purpose and findings of the assessment, and prepares reports on the findings. Assists in developing security solutions to correct deficiencies that cannot be fixed with existing solutions.
* Performs information operations that protect and defend (or assess the capability to protect and defend) information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. Conducts risk and vulnerability assessments of DoD information systems to identify associated vulnerabilities, risks and protection needs.
Performs OPFOR and other operational tasking. Operates fixed and deployed communications-computer systems. Performs activities such as configuring and monitoring hardware and software for system operation, processing and control of data flow, and client-server multi-user system support including network management or administration. Evaluates and assesses vulnerabilities of customer network and application server hardware, operating system software, and peripheral network equipment such as routers, bridges, switches, attached cabling system, network interface cards, modems, multiplexers, and concentrators.
Conducts evaluations to ensure compliance with applicable standards. Ensures system backups are performed to ensure expedient restoration of the database for the respective network equipment. Evaluates effectiveness of customer network firewalls.
* Conducts analyses of network usage, hardware and software capabilities, ineffective practices or procedures, equipment shortcomings, and other relevant factors. Recommends methods and procedures and coordinates corrective action to optimize utilization of present equipment. Uses benchmarks, performance measurement, and evaluation data, in conjunction with vulnerability assessment techniques. Develops recommendations or proposals involving a variety of specialized systems and improved operational efficiency.
Exercises authority and oversight of the squadron's digital training range(s), a suite of servers, routers, switches, hubs and other devices which can be configured with a variety of different operating systems in various versions, and with pre-programmed vulnerabilities, to be used in Computer Network Operations (CNO) training.
* Consults with subordinates, supervisors, specialists, vendors, and sister IO squadrons to procure and maintain training range devices that realistically emulate Air Force networks and are flexibly re-configurable to emulate the network(s) of a specific Air Force base as needed to prepare for vulnerability assessment missions. Performs analysis and design of automated and manual systems related to the network. Provides data for intrusion detection analysis.
Determines applicability of established methods. Examines and evaluates alternative means of satisfying user requirements. Suggests technically feasible approaches and makes recommendations regarding the most effective countermeasures.
* Performs analysis and design of automated and manual systems related to the network. Provides data for intrusion detection analysis. Determines applicability of established methods. Provides technical advice to users. Examines and evaluates alternative means of satisfying…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×